Semantic Scholar uses AI to extract papers important to this topic.
A while ago I attended a symposium sponsored by the National Security Agency on cryptologic history. The NSA is a secretive US… Expand CRYPTANALYSIS OF THE SIGABA CIPHER By Heather Ellie Kwong SIGABA is a rotor-based cipher machine that is famous for its service… Expand CRYPTANALYSIS OF THE SIGABA CIPHER By Heather Ellie Kwong SIGABA is a rotor-based cipher machine that is famous for its service… Expand Abstract In this article, we consider an attack on the SIGABA cipher under the assumption that the largest practical keyspace is… Expand We argue that the complete Klebanov-Witten flow solution must be described by a Calabi-Yau metric on the conifold, interpolating… Expand Acknowledgments The author acknowledges sponsorship from the U.S. Department of Homeland Security, Science and Technology… Expand The ECM Mark II has been described previously in Cryptologia . An analysis of the motion of the rotors is presented here. A… Expand The ECM Mark II, a highly secure electromechanical cipher machine used during and after World War II, is described and examined… Expand